• Title/Summary/Keyword: computing infrastructure

Search Result 501, Processing Time 0.029 seconds

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Performance Comparison and Optimal Selection of Computing Techniques for Corridor Surveillance (회랑감시를 위한 컴퓨팅 기법의 성능 비교와 최적 선택 연구)

  • Gyeong-rae Jo;Seok-min Hong;Won-hyuck Choi
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.770-775
    • /
    • 2023
  • Recently, as the amount of digital data increases exponentially, the importance of data processing systems is being emphasized. In this situation, the selection and construction of data processing systems are becoming more important. In this study, the performance of cloud computing (CC), edge computing (EC), and UAV-based intelligent edge computing (UEC) was compared as a way to solve this problem. The characteristics, strengths, and weaknesses of each method were analyzed. In particular, this study focused on real-time large-capacity data processing situations such as corridor monitoring. When conducting the experiment, a specific scenario was assumed and a penalty was given to the infrastructure. In this way, it was possible to evaluate performance in real situations more accurately. In addition, the effectiveness and limitations of each computing method were more clearly understood, and through this, the help was provided to enable more effective system selection.

An Analysis of the 2016 Cyber Attack Detection Data in NISN HPC Service Environment (NISN HPC 서비스 환경에서 2016년 사이버 공격 탐지 데이터 분석)

  • Lee, Jae-Kook;Kim, Sung-Jun;Hong, Teayoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.190-191
    • /
    • 2017
  • 정보통신기술(ICT)의 발전으로 원격지에서 고속으로 HPC(High Performance Computing) 서비스를 이용할 수 있게 되었지만, HPC 서비스 환경을 대상으로 하는 사이버 공격도 끊이지 않고 발생하고 있다. 본 논문에서는 슈퍼컴퓨터 4호기 서비스 환경에서 탐지/차단된 사이버 공격 증가 추이를 살펴보고, 2016년 사이버 공격 탐지 데이터와 슈퍼컴퓨팅서비스 네트워크 내부로 유입된 트래픽 데이터를 분석하여 급격히 증가한 공격지 IP 주소의 분포 및 특징을 확인한다.

Design and Construction of WLCG/EGEE Tier-2 (WLCG/EGEE 티어-2의 설계 및 구축)

  • Kwak, Jae-Hyuck;Lee, Pillwoo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.255-258
    • /
    • 2007
  • WLCG/EGEE project has a main goal of providing application scientists with access to a geographically distributed computing Grid infrastructure. Currently, WLCG/EGEE infrastructure is the world's largest Grid infrastructure, providing over 20,000 CPUs and about 3 PB disk at 200 international sites and used by over 9 application domains including LHC experiments from high-energy physics. This paper addresses the design and construction of WLCG/EGEE tier-2 propelled by international collaboration with EGEE-II project.

  • PDF

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure

  • Ryoo, Jung-Woo;Park, Eun-A
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.33-50
    • /
    • 2011
  • In this paper we applied our previously developed assessment framework to the data collected from an internet security readiness survey targeted at households. We used the assessment framework to compute an Internet Security Readiness index for each household, which was in turn derived from Internet Security Readiness capital, skill, and actual uptake/use of infrastructure indices. We then examined the relationships among overall Internet Security Readiness, and the capital, skill, and actual uptake/use of infrastructure related to Internet Security Readiness. In addition, we explored the influence of Internet usage level and experience on Internet Security Readiness.

A study on comparison and analysis of interconnect network communication performance between computing nodes in GPU cluster system (GPU 클러스터 시스템의 계산노드 간 인터커넥트 네트워크 통신 성능 비교 분석 연구)

  • Min-Woo Kwon;Do-Sik An;TaeYoung Hong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.2-4
    • /
    • 2023
  • KISTI의 GPU 클러스터 시스템인 뉴론은 NVIDIA의 A100과 V100 GPU가 총 260개 탑재되어 있는 클러스터 시스템이다. 뉴론의 계산노드들은 고성능의 인터커넥트인 Infiniband(IB) 케이블로 연결되어 있어 멀티 노드 작업 수행 시에 고대역 병렬통신이 가능하다. 본 논문에서는 NVIDIA사에서 제공하는 NCCL의 벤치마크 코드를 이용하여 인터커넥트 네트워크의 통신 성능을 비교분석하는 방안에 대해서 소개한다.

Prediction Method about Power Consumption by Using Utilization Rate of Resources in Cloud Computing Environment (클라우드 컴퓨팅 환경에서 자원의 사용률을 이용한 소비전력 예측 방안)

  • Park, Sang-myeon;Mun, Young-song
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.7-14
    • /
    • 2016
  • Recently, as cloud computing technologies are developed, it enable to work anytime and anywhere by smart phone and computer. Also, cloud computing technologies are suited to reduce costs of maintaining IT infrastructure and initial investment, so cloud computing has been developed. As demand about cloud computing has risen sharply, problems of power consumption are occurred to maintain the environment of data center. To solve the problem, first of all, power consumption has been measured. Although using power meter to measure power consumption obtain accurate power consumption, extra cost is incurred. Thus, we propose prediction method about power consumption without power meter. To proving accuracy about proposed method, we perform CPU and Hard disk test on cloud computing environment. During the tests, we obtain both predictive value by proposed method and actual value by power meter, and we calculate error rate. As a result, error rate of predictive value and actual value shows about 4.22% in CPU test and about 8.51% in Hard disk test.

Design and Implementation of Multi-Cloud Service Common Platform (멀티 클라우드 서비스 공통 플랫폼 설계 및 구현)

  • Kim, Sooyoung;Kim, Byoungseob;Son, Seokho;Seo, Jihoon;Kim, Yunkon;Kang, Dongjae
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.75-94
    • /
    • 2021
  • The 4th industrial revolution needs a fusion of artificial intelligence, robotics, the Internet of Things (IoT), edge computing, and other technologies. For the fusion of technologies, cloud computing technology can provide flexible and high-performance computing resources so that cloud computing can be the foundation technology of new emerging services. The emerging services become a global-scale, and require much higher performance, availability, and reliability. Public cloud providers already provide global-scale services. However, their services, costs, performance, and policies are different. Enterprises/ developers to come out with a new inter-operable service are experiencing vendor lock-in problems. Therefore, multi-cloud technology that federatively resolves the limitations of single cloud providers is required. We propose a software platform, denoted as Cloud-Barista. Cloud-Barista is a multi-cloud service common platform for federating multiple clouds. It makes multiple cloud services as a single service. We explain the functional architecture of the proposed platform that consists of several frameworks, and then discuss the main design and implementation issues of each framework. To verify the feasibility of our proposal, we show a demonstration which is to create 18 virtual machines on several cloud providers, combine them as a single resource, and manage it.

High-Performance computing and future of materials simulation (고성능 컴퓨팅 환경과 대규모 재료 시뮬레이션의 미래)

  • Choe, Deok-Gi
    • Journal of Scientific & Technological Knowledge Infrastructure
    • /
    • s.8
    • /
    • pp.26-35
    • /
    • 2002
  • 초기 컴퓨터는 주로 원자핵물리와 관련된 계산에 사용되었으나 곧바로 컴퓨터의 도움을 받아 물리 문제를 해결하고자 하는 방법은 물리 전 분야에서 광범위하게 적용되었다. 물질의 가장 작은 요소를 찾고자하는 소립자물리학에서부터, 물질의 성질을 규명하는 응집물질물리, 나아가서 거대 우주의 구조를 밝히고자 하는 우주론에 이르기까지 컴퓨터의 사용이 확장되고 있다.

  • PDF

New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing

  • Zhang, Leyou;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1343-1356
    • /
    • 2013
  • Cloud computing has emerged as perhaps the hottest development in information technology at present. This new computing technology requires that the users ensure that their infrastructure is safety and that their data and applications are protected. In addition, the customer must ensure that the provider has taken the proper security measures to protect their information. In order to achieve fine-grained and flexible access control for cloud computing, a new construction of hierarchical attribute-based encryption(HABE) with Ciphertext-Policy is proposed in this paper. The proposed scheme inherits flexibility and delegation of hierarchical identity-based cryptography, and achieves scalability due to the hierarchical structure. The new scheme has constant size ciphertexts since it consists of two group elements. In addition, the security of the new construction is achieved in the standard model which avoids the potential defects in the existing works. Under the decision bilinear Diffie-Hellman exponent assumption, the proposed scheme is provable security against Chosen-plaintext Attack(CPA). Furthermore, we also show the proposed scheme can be transferred to a CCA(Chosen-ciphertext Attack) secure scheme.